Information flow model of integrated security system
The goal of this paper is to study the effectivity and reliability of signal transferring by security systems via communication channels, as well as to define the main criteria of the available communication channels affecting the total response time of security systems. This paper mainly models and...
Gespeichert in:
Hauptverfasser: | , , |
---|---|
Format: | Tagungsbericht |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 572 Vol.1 |
---|---|
container_issue | |
container_start_page | 567 |
container_title | |
container_volume | |
creator | Valinevicius, A. Zilys, M. Eidukas, D. |
description | The goal of this paper is to study the effectivity and reliability of signal transferring by security systems via communication channels, as well as to define the main criteria of the available communication channels affecting the total response time of security systems. This paper mainly models and empirically solves the following tasks: application of information theory on streams in telecommunication systems to integrated security systems and calculations of system losses. With respect to the fundamentals of massive service systems, a model is imitated for the security systems. Using this model, experiments on the reliability and effectiveness of security systems are performed, so as to find more effective and reliable operating algorithms for security systems |
format | Conference Proceeding |
fullrecord | <record><control><sourceid>pascalfrancis_6IE</sourceid><recordid>TN_cdi_pascalfrancis_primary_16368900</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>1372477</ieee_id><sourcerecordid>16368900</sourcerecordid><originalsourceid>FETCH-LOGICAL-i135t-3f527bcb40355067baed2397cb1ab57f3a546d7fd9b02652ce9c19f1bec15e253</originalsourceid><addsrcrecordid>eNpFj8tKBDEURAMiqO18gZtsXDZ0cvsmZimDj4EBN7oe8riRSHdnSCLSf-_ACNamFqc4UBfsxiAYpZUx4optav0aTgGDctDXbNwtMZfZtpQXHqf8w-ccaOI58rQ0-iy2UeCV_HdJbeV1rY3mW3YZ7VRp89cd-3h-et--9vu3l932cd8nAdh6iCi1824cAHFQ2lkKEoz2TliHOoLFUQUdg3GDVCg9GS9MFI68QJIIHbs_e4-2ejvFYhef6uFY0mzLehAK1IM5fenY3XmXiOgfg5aj1vALguRLaw</addsrcrecordid><sourcetype>Index Database</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>Information flow model of integrated security system</title><source>IEEE Electronic Library (IEL) Conference Proceedings</source><creator>Valinevicius, A. ; Zilys, M. ; Eidukas, D.</creator><creatorcontrib>Valinevicius, A. ; Zilys, M. ; Eidukas, D.</creatorcontrib><description>The goal of this paper is to study the effectivity and reliability of signal transferring by security systems via communication channels, as well as to define the main criteria of the available communication channels affecting the total response time of security systems. This paper mainly models and empirically solves the following tasks: application of information theory on streams in telecommunication systems to integrated security systems and calculations of system losses. With respect to the fundamentals of massive service systems, a model is imitated for the security systems. Using this model, experiments on the reliability and effectiveness of security systems are performed, so as to find more effective and reliable operating algorithms for security systems</description><identifier>ISBN: 9539676991</identifier><identifier>ISBN: 9789539676993</identifier><language>eng</language><publisher>Zagreb: IEEE</publisher><subject>Applied sciences ; Communication channels ; Communication system security ; Computer science; control theory; systems ; Computer systems and distributed systems. User interface ; Delay ; Exact sciences and technology ; Information security ; Information systems. Data bases ; Information theory ; Memory organisation. Data processing ; Protection ; Protocols ; Reliability engineering ; Software ; Telephony ; Wire</subject><ispartof>26th International Conference on Information Technology Interfaces, 2004, 2004, p.567-572 Vol.1</ispartof><rights>2005 INIST-CNRS</rights><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/1372477$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,780,784,789,790,2058,4050,4051,54920</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/1372477$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc><backlink>$$Uhttp://pascal-francis.inist.fr/vibad/index.php?action=getRecordDetail&idt=16368900$$DView record in Pascal Francis$$Hfree_for_read</backlink></links><search><creatorcontrib>Valinevicius, A.</creatorcontrib><creatorcontrib>Zilys, M.</creatorcontrib><creatorcontrib>Eidukas, D.</creatorcontrib><title>Information flow model of integrated security system</title><title>26th International Conference on Information Technology Interfaces, 2004</title><addtitle>ITI</addtitle><description>The goal of this paper is to study the effectivity and reliability of signal transferring by security systems via communication channels, as well as to define the main criteria of the available communication channels affecting the total response time of security systems. This paper mainly models and empirically solves the following tasks: application of information theory on streams in telecommunication systems to integrated security systems and calculations of system losses. With respect to the fundamentals of massive service systems, a model is imitated for the security systems. Using this model, experiments on the reliability and effectiveness of security systems are performed, so as to find more effective and reliable operating algorithms for security systems</description><subject>Applied sciences</subject><subject>Communication channels</subject><subject>Communication system security</subject><subject>Computer science; control theory; systems</subject><subject>Computer systems and distributed systems. User interface</subject><subject>Delay</subject><subject>Exact sciences and technology</subject><subject>Information security</subject><subject>Information systems. Data bases</subject><subject>Information theory</subject><subject>Memory organisation. Data processing</subject><subject>Protection</subject><subject>Protocols</subject><subject>Reliability engineering</subject><subject>Software</subject><subject>Telephony</subject><subject>Wire</subject><isbn>9539676991</isbn><isbn>9789539676993</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2004</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><sourceid>RIE</sourceid><recordid>eNpFj8tKBDEURAMiqO18gZtsXDZ0cvsmZimDj4EBN7oe8riRSHdnSCLSf-_ACNamFqc4UBfsxiAYpZUx4optav0aTgGDctDXbNwtMZfZtpQXHqf8w-ccaOI58rQ0-iy2UeCV_HdJbeV1rY3mW3YZ7VRp89cd-3h-et--9vu3l932cd8nAdh6iCi1824cAHFQ2lkKEoz2TliHOoLFUQUdg3GDVCg9GS9MFI68QJIIHbs_e4-2ejvFYhef6uFY0mzLehAK1IM5fenY3XmXiOgfg5aj1vALguRLaw</recordid><startdate>2004</startdate><enddate>2004</enddate><creator>Valinevicius, A.</creator><creator>Zilys, M.</creator><creator>Eidukas, D.</creator><general>IEEE</general><general>University Computing Centre</general><scope>6IE</scope><scope>6IL</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIL</scope><scope>IQODW</scope></search><sort><creationdate>2004</creationdate><title>Information flow model of integrated security system</title><author>Valinevicius, A. ; Zilys, M. ; Eidukas, D.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-i135t-3f527bcb40355067baed2397cb1ab57f3a546d7fd9b02652ce9c19f1bec15e253</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2004</creationdate><topic>Applied sciences</topic><topic>Communication channels</topic><topic>Communication system security</topic><topic>Computer science; control theory; systems</topic><topic>Computer systems and distributed systems. User interface</topic><topic>Delay</topic><topic>Exact sciences and technology</topic><topic>Information security</topic><topic>Information systems. Data bases</topic><topic>Information theory</topic><topic>Memory organisation. Data processing</topic><topic>Protection</topic><topic>Protocols</topic><topic>Reliability engineering</topic><topic>Software</topic><topic>Telephony</topic><topic>Wire</topic><toplevel>online_resources</toplevel><creatorcontrib>Valinevicius, A.</creatorcontrib><creatorcontrib>Zilys, M.</creatorcontrib><creatorcontrib>Eidukas, D.</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE Electronic Library (IEL)</collection><collection>IEEE Proceedings Order Plans (POP All) 1998-Present</collection><collection>Pascal-Francis</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Valinevicius, A.</au><au>Zilys, M.</au><au>Eidukas, D.</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>Information flow model of integrated security system</atitle><btitle>26th International Conference on Information Technology Interfaces, 2004</btitle><stitle>ITI</stitle><date>2004</date><risdate>2004</risdate><spage>567</spage><epage>572 Vol.1</epage><pages>567-572 Vol.1</pages><isbn>9539676991</isbn><isbn>9789539676993</isbn><abstract>The goal of this paper is to study the effectivity and reliability of signal transferring by security systems via communication channels, as well as to define the main criteria of the available communication channels affecting the total response time of security systems. This paper mainly models and empirically solves the following tasks: application of information theory on streams in telecommunication systems to integrated security systems and calculations of system losses. With respect to the fundamentals of massive service systems, a model is imitated for the security systems. Using this model, experiments on the reliability and effectiveness of security systems are performed, so as to find more effective and reliable operating algorithms for security systems</abstract><cop>Zagreb</cop><pub>IEEE</pub><tpages>6</tpages></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | ISBN: 9539676991 |
ispartof | 26th International Conference on Information Technology Interfaces, 2004, 2004, p.567-572 Vol.1 |
issn | |
language | eng |
recordid | cdi_pascalfrancis_primary_16368900 |
source | IEEE Electronic Library (IEL) Conference Proceedings |
subjects | Applied sciences Communication channels Communication system security Computer science control theory systems Computer systems and distributed systems. User interface Delay Exact sciences and technology Information security Information systems. Data bases Information theory Memory organisation. Data processing Protection Protocols Reliability engineering Software Telephony Wire |
title | Information flow model of integrated security system |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-27T02%3A43%3A01IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-pascalfrancis_6IE&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=Information%20flow%20model%20of%20integrated%20security%20system&rft.btitle=26th%20International%20Conference%20on%20Information%20Technology%20Interfaces,%202004&rft.au=Valinevicius,%20A.&rft.date=2004&rft.spage=567&rft.epage=572%20Vol.1&rft.pages=567-572%20Vol.1&rft.isbn=9539676991&rft.isbn_list=9789539676993&rft_id=info:doi/&rft_dat=%3Cpascalfrancis_6IE%3E16368900%3C/pascalfrancis_6IE%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=1372477&rfr_iscdi=true |